Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Amazon Elastic Kubernetes Service (EKS) is the AWS service an abstracted infrastructure requirement for deploying, managing, and scaling DIGIT on AWS.

Prerequisites

Set up Terraform with AWS

The first thing to set up is your Terraform. We will create an AWS IAM user for Terraform.

In your AWS console, go to the IAM section and create a user named “FullAccess”. Then add your user to a group named “FullAccessGroup”. Attaches to this group the following rights:

  • AdministratorAccess

  • AmazonEKSClusterPolicy

After these steps, AWS will provide you a Secret Access Key and Access Key IDSave them preciously because this will be the only time AWS gives it to you.

In your own console, create a ~/.aws/credentials file and put your credentials in it:

Code Block
[default]
 aws_access_key_id=***********
 aws_secret_access_key=****************************

The last step is to create this file:

Code Block
[default]
 region=eu-west-3

Set up and initialize your Terraform workspace

‌Clone the following repository:

Code Block
git clone https://github.com/egovernments/

...

DIGIT-

...

DevOps.git
cd 

...

DIGIT-DevOps/infra-as-code/terraform
Code Block
└── modules
    ├── db
    │   └── aws
    │       ├── main.tf
    │       ├── outputs.tf
    │       └── variables.tf
    ├── kubernetes
    │   └── aws
    │       ├── eks-cluster
    │       │   ├── main.tf
    │       │   ├── outputs.tf
    │       │   └── variables.tf
    │       ├── network
    │       │   ├── main.tf
    │       │   ├── outputs.tf
    │       │   └── variables.tf
    │       └── workers
    │           ├── main.tf
    │           ├── outputs.tf
    │           └── variables.tf
    └── storage
        └── aws
            ├── main.tf
            ├── outputs.tf
            └── variables.tf

In here, you will find three modules used to provision a EKS cluster, RDS, and Storage.

Kubernetes module:

  • VPC Resources:

    • VPC

    • Subnets

    • Internet Gateway

    • Route Table

  • EKS Cluster Resources:

    • IAM Role to allow EKS service to manage other AWS services

    • EC2 Security Group to allow networking traffic with EKS cluster

    • EKS Cluster

  • EKS Worker Nodes Resources:

    • IAM role allowing Kubernetes actions to access other AWS services

    • EC2 Security Group to allow networking traffic

    • Data source to fetch latest EKS worker AMI

    • AutoScaling Launch Configuration to configure worker instances

    • AutoScaling Group to launch worker instances

Database Module:

Configuration in this directory creates set of RDS resources including DB instance, DB subnet group, and DB parameter group.

Storage Module:

Configuration in this directory creates EBS volume and attach attaches it together.

Set up an environment

Here, you will find five files used to provision a VPC, security groups, iam IAM users, storages, EKS cluster, s3 bucket. The final product should be similar to this:

Code Block
├── dev
│   ├── main.tf
│   ├── outputs.tf
│   ├── providers.tf
│   ├── remote-state
│   │   └── main.tf
│   └── variables.tf
├── qa
    ├── main.tf
    ├── outputs.tf
    ├── providers.tf
    ├── remote-state
    │   └── main.tf
    └── variables.tf

Source The source for the each modules module in the main.tf is from the modules like:

...

Configuration in this directory creates a set of:

  • s3 bucket: to store terraform state.

  • Network: VPC, security groups.

  • iam IAM users auth: using keybase to create admin, deployer, the user.

  • EKS cluster: with master(s) & worker node(s).

  • Storage(s): for es-master, es-data-v1, es-master-infra, es-data-infra-v1, zookeeper, kafka, kafka-infra.

Code Block
cd eGov-infraOps/terraform/dev
terraform init
terraform apply
terraform output

The Kubernetes tools can be used to verify the newly created cluster. Once terraform apply execution is done it will generate the Kubernetes configuration file or you can get it from terraform state.

Set an environment variable so that kubectl picks up the correct config.

...